Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Ultimate Guide to Red Hat Summit 2018 Labs: Hands-on with Linux Containers

DZone's Guide to

Ultimate Guide to Red Hat Summit 2018 Labs: Hands-on with Linux Containers

Whether you were already going to Red Hat Summit or just got interested, this article will give you some valuable insight into what to expect.

· Cloud Zone ·
Free Resource

Insight into the right steps to take for migrating workloads to public cloud and successfully reducing cost as a result. Read the Guide.


This year you've got a lot of decisions to make before you got to Red Hat Summit in San Francisco, CA from 8-10 May 2018.

There are breakout sessions, birds-of-a-feather sessions, mini sessions, panels, workshops, and instructor led labs that you're trying to juggle into your daily schedule. To help with these plans, let's try to provide an overview of the labs in this series.

Our first article is starting with a focus on Linux containers, where you can get hands-on with everything from container security, containerizing applications, developing container solutions and digging in to container internals.

The following hands-on labs are on the agenda, so let's look at the details of each one.

Linux Container Internals: Part 1 and Part 2

Have you ever wondered how Linux containers work? How they really work, deep down inside? Do you have questions like:

- How does sVirt/SELinux, SECCOMP, namespaces, and isolation really work?

- How does the Docker Daemon work?

- How does Kubernetes talk to the Docker Daemon?

- How are container images made?

In this lab, we'll answer all of these questions and more. If you want a deep technical understanding of containers, this is the lab for you. It's an engineering walk through the deep, dark internals of the container host, what’s packaged in the container image, and how container orchestration work. You'll get the knowledge and confidence it takes to apply your current Linux technical knowledge to containers.

Presenters: Scott McCarty, Red Hat; John Osborne, Red Hat; Jamie Duncan, Red Hat

A Practical Introduction to Container Security (3rd Ed.)

Linux containers provide convenient application packing and run time isolation in multi-tenant environments. However, the security implications of running containerized applications is often taken for granted. For example, today it is very easy to pull container images from the Internet and run them in the enterprise without examining their content and authenticity.

In this lab, you'll complete a series of low-level, hands-on exercises aimed at understanding the concepts, challenges, and best practices associated with deploying containers in a secure fashion. Topics include registry configuration, SELinux, capabilities, and SECCOMP profiles, along with image inspection, scanning, and signing. This third edition may be based on CRI-O, depending on Red Hat Enterprise Linux feature release time frames.

Presenters: Bob Kozdemba, Red Hat, Inc.; Daniel Walsh, Red Hat; Aaron Weitekamp, Red Hat

Containerizing Applications—Existing and New

In this hands-on lab, based on highly rated labs from Red Hat Summit 2016 and 2017, you'll learn how to create containerized applications from scratch and from existing applications.

Learn how to build and test these applications in a Red Hat OpenShift environment, as well as deploy new containers to Red Hat Enterprise Linux Atomic Host. You'll quickly develop a basic containerized application, migrate a simple popular application to a containerized version, and deploy your new applications to container host platforms. You’ll get a feel for the different container host platforms and learn how to choose the best one for your container needs. And finally, you’ll learn what to consider and what tools you can use when implementing a containerized microservices architecture.

Presenters: Langdon White, Red Hat; Scott Collier, Red Hat; Tommy Hughes, Red Hat; Dusty Mabe, Red Hat

Develop IoT Solutions with Containers and Serverless Patterns

The Internet of Things (IoT) is expected to generate a diverse range of data types that will need different mechanisms to process and trigger actions. Combined with other considerations, like total cost of ownership, required skill set, and operations, the back end solution may be composed of different architectures and patterns.
ultimate guide red hat summit labsIn this hands-on lab, you'll learn how to build a containerized. Intelligent IoT solution that can process different data types using the elasticity of a container platform, such as Red Hat OpenShift Container Platform, and serverless architectures to execute on-demand functions in response to IoT events. Using the qualities of each architectural style, developers can focus on writing code without worrying about provisioning and operating server resources, regardless of the scale. The methodologies exemplified within this lab can be used by companies looking to use their cloud computing infrastructure to build complex and robust IoT solutions.

Presenters: Ishu Verma, Red Hat, Andrew Block, Red Hat

Stay tuned for more Red Hat Summit 2018 Labs and watch for more online under the tag #RHSummitLabs.

TrueSight Cloud Cost Control provides visibility and control over multi-cloud costs including AWS, Azure, Google Cloud, and others.

Topics:
cloud ,red hat ,conference ,red hat summit ,container

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}